2. Why blue eyes technology? A study has shown that people with personalities that are similar or complement each other collaborate well. Dryer (1999) has also shown that people view their computer as having a personality. For these reasons, it is important to develop computers which can work well with its user. This is where the blue eyes technology comes into force. The ABILITIES:to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presence, and starts interacting with you
3. OBJECTIVES: creatingcomputational machines that have perceptual and sensory ability like those of human beings. It uses : (1)non-obtrusive sensing method, (2)employing most modern video cameras and (3)microphones to identifies the users actions through the use of imparted sensory abilities . The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners.
5. EMOTION MOUSE The diff. ways of getting info could possibly include: Since a user is mostly in direct contact with an input device, say a mouse, a mouse is an apt way to gather info
6. Ekman’s Facial Action Coding System In order to start creating smart computers, the computer must start gaining information about the user SCOPE:to have the computer adapt to the user in order to create a better working environment where the user is more productive. LOGIC: There is always a correlation between a person’s emotional state and a person’s physiological measurements
7. So various physiological measurements could be used to distinguish various emotional states. They are:
8. Data Analysis: The data corresponding to the various physiological measurements is subjected to 2 analysis:
9. Overall result of analysis: these four physiological measures are sufficient to determine reliably a person’s specific emotional state. One can take these measurements from the hand. The amount of conductivity of the skin is best taken from the fingers. Changes in the temperature of the finger are reliable for prediction of emotion and by change in movement in the computer mouse.
10. EXPERIMENTAL DESIGN The diff. instruments used in the measurement of various physiological measurements are:
11. THE EXPERIMENT: Participants were asked to sit in front of the computer and hold the temperature and GSR sensors in their left hand hold the mouse with their right hand and wore the chest sensor. The resting (baseline) measurements were recorded for five minutes and then the participant was instructed to act out one emotion for five minutes. The emotions consisted of: 1.anger, 2.fear, 3.sadness, 4.disgust, 5.happiness and 6.surprise.
12. The only instruction for acting out the emotion was to show the emotion in their facial expressions. The sampling rates of diff. measurements: And now by performing certain calculations with these scores and treating those scores which deviated a lot as missing, 1st analysis is completed.
13. In order to determine whether the measures of physiology could discriminate among the six different emotions, the data is analyzed with a discriminant function analysis. Now based on the data the emotion was predicted for the samples which did not deviate much from the mean and two-thirds of the cases were successfully classified.
15. ADDITIONAL IMPROVISATION RECOMMENDED: Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome multimeters to gather information about the user, it will be better to use smaller and less intrusive units. We can use infrared pulse detector which can be placed inside the body of the mouse. Also, a framework for the user modeling needs to be develop in order to correctly handle all of the information after it has been gathered.
17. What is it? This work explores a new direction in utilizing eye gaze for computer input. Gaze tracking has long been considered as an alternative or potentially superior pointing method for computer input. But there are many fundamental limitations existing with traditional gaze pointing.For an example, the user has to be aware of the eye movements. But with MAGIC (an improved form of eye gazing),a large portion of the cursor movement is eliminated by warping the cursor to the eye gaze area, which encompasses the target There are two techniques:(1)conservative,(2)liberal.
18. THE PROs AND CONs: ADVANTAGES: Reduced physical effort and fatigue as compared to traditional manual pointing, greater accuracy and naturalness than traditional gaze pointing, and possibly faster speed than manual pointing. DISADVANTAGES: (1).First, given the one-degree size of the fovea and the subconscious jittery motions that the eyes constantly produce, eye gaze is not precise enough to operate UI widgets such as scrollbars, hyperlinks, and slider handles. (2). Eye has not evolved to be a control organ. Sometimes its movements are voluntarily controlled while at other times it is driven by external events. With the target selection by dwell time method, considered more natural than selection by blinking, one has to be conscious of where one looks and how long one looks at an object
19. TARGET ACTIVATION: If one does not look at a target continuously for a set threshold (e.g., 200 ms), the target will not be successfully selected. On the other hand, if one stares at an object for more than the set threshold, the object will be selected, regardless of the user’s intention. In some cases there is not an adverse effect to a false target selection. Other times it can be annoying and counter-productive (such as unintended jumps to a web page).
20. ACTUAL WORKING: In MAGIC, pointingand selection remains primarily a manual control task but it is aided by gaze tracking. The key idea is to use gaze to dynamically redefine (warp) the “home” position of the pointing cursor to be at the vicinity of the target, which was presumably what the user was looking at, thereby effectively reducing the cursor movement amplitude needed for target selection. Once the cursor position had been redefined, the user would need to only make a small movement to, and click on, the target with a regular manual input device
21. Liberal technique: Here the cursor automatically moves to the point where the user is staring or at least to its vicinity. The liberal approach may appear “pro-active”, since the cursor waits readily in the vicinity of or on every potential target. The user may also feel that the cursor is over-active when he is merely looking at a target.
22. Conservative: This technique does not warp a cursor to a target until the manual input device has been actuated. Once the manual input device has been actuated the cursor is warped to the gaze area reported by the eye tracker. This area should be on or in the vicinity of the target. The user would then steer the cursor annually towards the target to complete the target acquisition. Once the user looks at a target and moves the input device, the cursor will appear “out of the blue” in motion towards the target,
23. Potential advantages of MAGIC pointing techniques: Reduction of manual stress and fatigue. Practical accuracy level in comparison to traditional pure gaze pointing. The user does not have to be aware of the role of the eye gaze. Speed. {Fitts’ Law, manual pointing time is logarithmically proportional to the A/W ratio, where A is the movement distance and W is the target size. In other words, targets which are smaller or farther away take longer to acquire. } Improved subjective speed and ease-of-use.
24. Changes recommended: The cursor warping can be overactive at times, which could be particularly distracting when the user is trying to read. So,Whenthe user’s eye appears to follow a text reading pattern, MAGIC pointing can be automatically suppressed. conservative MAGIC pointing technique adopts a cumbersome strategy: take a touch, wait , and move. Such a strategy may prolong the target acquisition time. The user has to learn a novel hand-eye coordination pattern to be efficient. Clearly, experimental (implementation and empirical) work is needed to validate, refine, or invent alternative MAGIC pointing techniques.
25. THE EYE TRACKER One can purchase the a commercial eye tracker (ASL Model 5000), this system is much more compact and reliable. It is still not robust enough for a variety of people with different eye characteristics, such as pupil brightness and correction glasses. Available commercial systems rely on a single light source that is positioned either off the camera axis or on-axis. Illumination from an off-axis source (or ambient illumination) generates a dark pupil image.
26. Dark and bright images: When the light source is placed on-axis with the camera optical axis, the camera is able to detect the light reflected from the interior of the eye, and the image of the pupil appears bright The Almaden system uses two near infrared (IR) time multiplexed light sources, composed of two sets of IR LED's, which were synchronized with the camera frame rate. Bright(left) and dark(right) images resulting from on and off axis illumination. The glints, or corneal reflections, from the on- and off-axis light sources can be easily identified as the bright points in the iris.
27. Identification of the pupil: One light source is placed very close to the camera's optical axis and is synchronized with the even frames. Odd frames are synchronized with the second light source, positioned off axis. The two light sources are calibrated to provide approximately equivalent whole-scene illumination. Pupil detection is realized by means of subtracting the dark pupil image from the bright pupil image. After thresholding the difference, the largest connected component is identified as the pupil. This technique significantly increases the robustness and reliability of the eye tracking system. This is similar pupil detection schemes independently developed by Tomonoetal and Ebisawa and Satoh. But such a method has not been used in the commercial systems.
28. Implementing MAGIC pointing: The MAGIC pointing program takes data from both the manual input device and the eye tracking system running either on the same machine or on another machine connected via serial port. Raw data from an eye tracker can not be directly used for gaze-based interaction, due to noise from image processing, eye movement jitters, and samples taken during saccade (ballistic eye movement) periods.
29. One has to experiment with various filtering techniques. The goal of filter design in general is to make the best compromise between preserving signal bandwidth and eliminating unwanted noise. Samples collected during a saccade are unwanted and should be avoided. In designing our algorithm for picking points of fixation, consider our tracking system speed (30 Hz), and that the MAGIC pointing techniques utilize gaze information only once for each new target, probably immediately after a saccade. Our filtering algorithm was designed to pick a fixation with minimum delay by means of selecting two adjacent points over two samples.
31. HURDLES OF SPEECH RECOGNITION: It is important to consider the environment in which the speech recognition system has to work: (1)The grammar used by the speaker and accepted by the system, (2)noise level, (3)noise type, (4)position of the microphone and (5)speed and manner of the user’s speech are some factors that may affect the quality of speech recognition The best example for speech recognition system : an automatic call-handling system is used without employing any telephone operator.
32. THE TECHNOLOGY Two basic ideas: AI makes machines smarter and more useful, and is less expensive than natural intelligence. Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are scanned and matched against internally stored known words. Identification of a key word causes some action to be taken.
34. Search process The search process takes a considerable amount of time, as the CPU has to make many comparisons before recognition occurs. This necessitates use of very high-speed processors. A largeRAM is also required as even though a spoken word may last only a few hundred milliseconds, but the same is translated into many thousands of digital words. It is important to note that alignment of words and templates are to be matched correctly in time, before computing the similarity score. This process, termed as dynamic time warping, recognizes that different speakers pronounce the same words at different speeds as well as elongate different parts of the same word.
35. MAJOR APPLICATIONS: Lets user do other works simultaneously: The user can concentrate on observation and manual operations, and still control the machinery by voice input commands. Military operations: Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give commands and information to the computers by simply speaking into their microphones—they don’t have to use their hands for this purpose. An Radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system connected to word processors. For making airline and hotel reservations: A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
37. Why SUITOR? Computers would have been much more powerful, had they gained perceptual and sensory abilities of the living beings on the earth. What needs to be developed is an intimate relationship between the computer and the humans. By observing the Webpage a netizen is browsing, the SUITOR can help by fetching more information at his desktop. By simply noticing where the user’s eyes focus on the computer screen, the SUITOR can be more precise in determining his topic of interest. The success lies in how much the suitor can be intimate to the user
38. Paul Maglio’S take on SUITOR: SUITOR fills a scrolling ticker on a computer screen with information related to the user's current task. "If I'm reading a Web page about IBM, for instance," says Paul Maglio, the Almaden cognitive scientist who invented SUITOR, "the system presents the latest stock price or business news stories that could affect IBM. If I read the headline off the ticker, it pops up the story in a browser window. If I start to read the story, it adds related stories to the ticker. That's the whole idea of an attentive system—one that attends to what you are doing, typing, reading, so that it can attend to your information needs."
39. THE FUTURE FOR BLUE EYES: The nineties witnessed quantum leaps interface designing for improved man machine interactions. The BLUE EYES technology ensures a convenient way of simplifying the life by providing more delicate and user friendly facilities in computing devices. Now that we have proven the method, the next step is to improve the hardware. Instead of using cumbersome modules to gather information about the user, it will be better to use smaller and less intrusive units. The day is not far when this technology will push its way into your house hold, making you more lazy. It may even reach your hand held mobile device. Any way this is only a technological forecast.
40. But definitely BLUE EYES TECHNOLOGY is the future. After all who would not want to own a computer that (1)can easily adapt to your mood, (2)perform tasks the moment you “actually tell” it what you want (3)help you by gathering more additional information (4)saves you the job of having to move your cursor to a long distance (5)with further additions, can even help to monitor your health.